U.S. patent application number 13/078345 was filed with the patent office on 2012-10-04 for methods and systems for authenticating one or more users of a vehicle communications and information system.
This patent application is currently assigned to FORD GLOBAL TECHNOLOGIES, LLC. Invention is credited to Robert Bruce Kleve, Ritesh Pandya, Brian Petersen, Edward Andrew Pleet, John Robert Van Wiemeersch.
Application Number | 20120254948 13/078345 |
Document ID | / |
Family ID | 46845278 |
Filed Date | 2012-10-04 |
United States Patent
Application |
20120254948 |
Kind Code |
A1 |
Kleve; Robert Bruce ; et
al. |
October 4, 2012 |
METHODS AND SYSTEMS FOR AUTHENTICATING ONE OR MORE USERS OF A
VEHICLE COMMUNICATIONS AND INFORMATION SYSTEM
Abstract
In at least one embodiment, a system for authorizing use of a
vehicle communication and information system may include one or
more data processors configured to receive information associating
one or more devices with a vehicle computer. The data processor(s)
may be also configured to receive information identifying a user
requesting authorization to command the vehicle controls from the
one or more devices associated with the vehicle computer. The
user(s) may be authorized to command the vehicle controls from the
one or more devices associated with the vehicle computer based on
performing an authentication process for authenticating the user,
determining that the user is an authenticated user based on the
authentication process, and enabling command of one or more vehicle
controls from the one or more remote devices via the associated
vehicle computer based on the user being authenticated.
Inventors: |
Kleve; Robert Bruce;
(Farmington, MI) ; Petersen; Brian; (Ferndale,
MI) ; Pandya; Ritesh; (Rochester Hills, MI) ;
Pleet; Edward Andrew; (Livonia, MI) ; Van Wiemeersch;
John Robert; (Novi, MI) |
Assignee: |
FORD GLOBAL TECHNOLOGIES,
LLC
Dearborn
MI
|
Family ID: |
46845278 |
Appl. No.: |
13/078345 |
Filed: |
April 1, 2011 |
Current U.S.
Class: |
726/4 |
Current CPC
Class: |
H04L 9/3215 20130101;
H04L 67/12 20130101; H04L 2209/80 20130101; G07C 9/30 20200101;
G06F 21/31 20130101; H04L 2209/84 20130101; G07C 9/00309 20130101;
G07C 2009/00769 20130101; H04L 63/0853 20130101 |
Class at
Publication: |
726/4 |
International
Class: |
G06F 21/00 20060101
G06F021/00 |
Claims
1. A system for authorizing use of a vehicle communication and
information system, the system comprising: one or more data
processors configured to: receive information associating one or
more devices remote from a vehicle with a vehicle computer; receive
information identifying a user requesting authorization to command
one or more vehicle controls from the one or more devices
associated with the vehicle computer; and authorize the user to
command one or more vehicle controls from the one or more devices
associated with the vehicle computer by performing the following
steps: performing an authentication process for authenticating the
user; determining that the user is an authenticated user based on
the authentication process; and enabling command of one or more
vehicle controls from the one or more remote devices via the
associated vehicle computer based on the user being
authenticated.
2. The system of claim 1 wherein the authentication process
includes: receiving one or more inputs for authentication; and
authenticating the user based on the one or more inputs for
authentication.
3. The system of claim 2 wherein the one or more inputs for
authentication are one or more authentication items selected from
one or more touch-based inputs, information from one or more
vehicle key transponders, one or more voice commands, one or more
codes, one or more patterns of maneuvers, or at least one question
and answer process.
4. The system of claim 2 wherein the one or more inputs for
authentication are received in response to one or more
notifications requesting authentication of the user.
5. The system of claim 2 wherein the inputs for authentication are
received in the vehicle.
6. The system of claim 1 wherein the information associating the
one or more devices with the data processor is an electronic serial
number (ESN).
7. The system of claim 1 wherein the associating information is
input at the one or more devices remote from the vehicle.
8. The system of claim 1 wherein the associating information is
stored on a centralized system communicating with the one or more
devices and the one or more data processors.
9. The system of claim 1 wherein the user identifying information
is an identifier associated with the one or more devices remote
from the vehicle.
10. The system of claim 1 wherein the identifier is a mobile
identification number.
11. A computer-implemented method for authorizing use of a vehicle
communication and information system, the method comprising:
receiving at one or more data processors information indicating
that a vehicle communications and information system (VCIS) is
associated with one or more command devices from which one or more
users command the VCIS; and authorizing at the one or more data
processors the one or more users to command the VCIS from the one
or more associated command devices by: receiving information
identifying one or more authenticating devices associated with the
one or more users; performing an authentication process using the
identified authenticating devices to authenticate the one or more
users; and if authenticated based on the authentication process,
enabling the one or more users to command the VCIS from the one or
more associated command devices.
12. The computer-implemented method of claim 11 wherein the
authentication process includes initiating a timer to measure a
time period during which the one or more users are authenticated
using the identified authenticating devices, wherein the one or
more users may command the VCIS from the one or more associated
command devices if authenticated during the time period.
13. The computer-implemented method of claim 12 further comprising
counting a number of authentication attempts during the time
period, wherein the one or more users are not authenticated if the
number of attempts is exceeded.
14. The computer-implemented method of claim 11 wherein the one or
more devices are remote from a vehicle.
15. The computer-implemented method of claim 14 wherein the one or
more devices include at least one of a nomadic device or a personal
computer.
16. The computer-implemented method of claim 11 further comprising:
providing the associating information to the one or more users;
receiving the associating information at the one or more remote
devices via user input; and storing the associating information at
the one or more data processors.
17. The computer-implemented method of claim 16 wherein the VCIS
identifying information is an electronic serial number of the
VCIS.
18. The computer-implemented method of claim 11 wherein authorizing
the one or more users to command the associated VCIS includes
authorizing the user to operate select functions of the VCIS.
19. A method comprising: receiving at a computer information
associating one or more devices for commanding vehicle controls
with a vehicle; receiving at the computer information identifying a
user requesting authorization to command vehicle controls from the
devices; and authorizing the command(s) from the devices by:
performing an authentication process to authenticate the user(s);
and if authenticated based on the process, enabling command of the
vehicle controls from the devices.
20. The method of claim 19 wherein the one or more devices are
remote from the vehicle.
21. The method claim 20 where the one or more devices remote from
the vehicle are nomadic device or a personal computer.
22. The method of claim 19 wherein the authentication process
includes: receiving one or more inputs for authentication; and
authenticating the user(s) based on the one or more inputs for
authentication.
23. The method of claim 22 wherein the one or more inputs for
authentication are one or more authentication items selected from
one or more touch-based inputs, information from one or more
vehicle key transponders, one or more voice commands, one or more
codes, one or more patterns of maneuvers, or at least one question
and answer process.
24. The method of claim 22 wherein the authentication process
further includes: initiating a timer to measure a time period
during which the one or more inputs for authentication are
received; authenticating the user(s) based on the one or more
inputs for authentication if received during the time period.
25. The computer-implemented method of claim 22 wherein the
authentication process further includes: counting a number of
authentication attempts; and authenticating the user(s) based on
the one or more inputs for authentication unless the number of
attempts is exceeded.
Description
BACKGROUND
[0001] 1. Technical Field
[0002] Various embodiments relate to an authentication process for
authenticating one or more user of a vehicle communication and
information system. In some embodiments, one or more vehicle users
may be authenticated before operating one or more vehicle controls
from a device remote from a vehicle.
[0003] 2. Background Art
[0004] For a variety of reasons including, but not limited to,
identification, security, and safety, a vehicle owner or user may
be authenticated as an authorized user of a vehicle communications
and information computing system before the system can be used by
the vehicle owner. Typically, this authentication may occur prior
to first use of the vehicle and/or vehicle communications and
information system. The authentication may occur at a dealership by
a dealer or dealer representative. Additionally or alternatively,
the authorization process may occur through a telephone call, or
other communication, to the automotive OEM (or an entity associated
with the automotive OEM responsible for handling such calls) by the
dealer, the vehicle owner, or other authorized person.
SUMMARY
[0005] One aspect is a system for authorizing use of a vehicle
communication and information system. The system includes one or
more data processors. The data processor(s) may be configured to
receive information associating one or more devices remote from a
vehicle with a vehicle computer. Further, the data processor(s) may
be configured to receive information identifying a user. The user
may request authorization to command one or more vehicle controls
from the one or more devices which are associated with the vehicle
computer. The data processor(s) may be further configured to
authorize the user to command one or more vehicle controls from the
one or more devices associated with the vehicle computer.
[0006] Authorizing the user(s) may include performing an
authentication process for authenticating the user. Further, it may
be determined that the user is an authenticated user based on the
authentication process. Based on the user being authenticated, the
command of one or more vehicle controls from the one or more remote
devices via the associated vehicle computer may be authorized.
[0007] In some embodiments, the authentication process may include
receiving one or more inputs for authentication and authenticating
the user based on the one or more inputs for authentication. The
one or more inputs may be one or more authentication items
including, but not limited to, one or more touch-based inputs,
information from one or more vehicle key transponders, one or more
voice commands, one or more codes, one or more patterns of
maneuvers, or at least one question and answer process.
[0008] In some embodiments, the inputs for authentication may be
received in the vehicle.
[0009] Another aspect is a computer-implemented method for
authorizing use of the vehicle communication and information
system. The method may include receiving information at one or more
data processors indicating that a vehicle communications and
information system (VCIS) is associated with one or more command
devices from which one or more users command the VCIS. The method
may also include authorizing at the data processor(s) the one or
more users to command the VCIS from the one or more associated
command devices.
[0010] The authorizing may include receiving information
identifying one or more authenticating devices associated with the
one or more users. Further, an authentication process may be
performed using the identified authenticating devices to
authenticate the one or more users. If the user(s) are
authenticated based on the authentication process, the user(s) may
command the VCIS from the one or more associated command
devices.
[0011] In some embodiments, the authentication process may include
initiating a timer to measure a time period during which the one or
more users are authenticated using the identified authenticating
devices. The one or more users may command the VCIS from the one or
more associated command devices if authenticated during the time
period.
[0012] In some embodiments, the authentication process may include
counting a number of authentication attempts during the time
period. If the number of attempts is exceeded, the user(s) may not
be authenticated.
[0013] Another aspect is a method comprising receiving information
at a computer associating one or more devices (e.g., a nomadic
device or a personal computer) for commanding vehicle controls with
a vehicle. Further, the method may include receiving information at
the computer identifying a user who may request authorization to
command vehicle controls from the devices. The method may also
include authorizing the command(s) from the devices.
[0014] The authorizing may include performing an authentication
process to authenticate the user(s). If the user(s) are
authenticated based on the process, the user(s) may command the
vehicle controls from the devices.
[0015] In some embodiment, the authentication process may include
receiving one or more inputs for authentication and authenticating
the user(s) based on the one or more inputs for authentication.
[0016] The one or more inputs for authentication may be one or more
authentication items. These authentication items may include, but
are not limited to, one or more touch-based inputs, information
from one or more vehicle key transponders, one or more voice
commands, one or more codes, one or more patterns of maneuvers, or
at least one question and answer process.
[0017] In some embodiments, the authentication process may further
include initiating a timer to measure a time period during which
the one or more inputs for authentication are received. Further,
the authentication process may include authenticating the user(s)
based on the one or more inputs for authentication if received
during the time period.
[0018] In some embodiments, the authentication process may further
include counting a number of authentication attempts and
authenticating the user(s) based on the one or more inputs for
authentication unless the number of attempts is exceeded.
[0019] These and other aspects will be better understood in view of
the attached drawings and following detailed description of the
invention.
BRIEF DESCRIPTION OF THE DRAWINGS
[0020] The figures identified below are illustrative of some
embodiments of the invention. The figures are not intended to be
limiting of the invention recited in the appended claims. The
embodiments, both as to their organization and manner of operation,
together with further object and advantages thereof, may best be
understood with reference to the following description, taken in
connection with the accompanying drawings, in which:
[0021] FIG. 1 shows an illustrative example of a communication
system through which a nomadic device can communicate with a
vehicle according to one of the various embodiments;
[0022] FIGS. 2a-d show illustrative examples of vehicle-based
communication devices that provide communication to a remote
network according to one of the various embodiments;
[0023] FIG. 3 illustrates a process for registering a device for
use with a vehicle communications and information computing
system;
[0024] FIG. 4A illustrates a process for authorizing use of a
vehicle communications and information computing system according
to one embodiment;
[0025] FIG. 4B illustrates a process for authorizing users of the
vehicle communications and information computing system according
to another embodiment; and
[0026] FIG. 5 illustrates a process for providing usage information
for the vehicle communications and information computing system to
an authenticated user.
DETAILED DESCRIPTION
[0027] A typical authentication process for authenticating vehicle
owners or users to use the vehicle's telematics system may not only
be expensive for an OEM, but also inconvenient for the vehicle
owner. Authentication may be performed through a human operator
with access to information for authenticating the vehicle user(s).
This may include, for example, access to remote systems, such as a
DMV's or Secretary of State's office, to verify the identity of the
vehicle owner/users. This may leave a limited time window for the
user to be authenticated (e.g., due to hours of operation).
Further, using human operators can be expensive for the OEM because
of the added cost of employing these individuals. Therefore, using,
for example (and without limitation), a nomadic device (such as a
cell phone), a vehicle owner and/or user can be authenticated to
use the vehicle's communication and information computing system
(VCIS) without the issues that may be associated with typical
authentication processes.
[0028] Detailed embodiments of the invention are disclosed herein.
However, it is to be understood that the disclosed embodiments are
merely exemplary of an invention that may be embodied in various
and alternative forms. Therefore, specific functional details
disclosed herein are not to be interpreted as limiting, but merely
as a representative basis for the claims and/or as a representative
basis for teaching one skilled in the art to variously employ the
present invention.
[0029] Additionally, the disclosure and arrangement of the figures
is non-limiting. Accordingly, the disclosure and arrangement of the
figures may be modified or re-arranged to best fit a particular
implementation of the various embodiments of the invention.
[0030] FIG. 1 shows an illustrative example of a
[0031] communication system 100 through which a nomadic device can
communicate with a vehicle 121. In this illustrative embodiment, a
nomadic device (e.g., without limitation, a cellular phone) 103 is
used to send a communication through a cellular network 107. This
communication is relayed through a network 111 (e.g., without
limitation, the cellular network, the internet, etc.) to a
centralized system 101. In another embodiment, the nomadic device
103 may send a communication through network 112 which may include,
but is not limited to, WiFi or WiMax. This communication is relayed
through a network 106 (e.g., without limitation, the internet,) to
a centralized system 101.
[0032] In this illustrative embodiment, the centralized system is a
server system that includes processing capability for incoming
nomadic device signals designated to interact with a remote vehicle
121.
[0033] For example, the server(s) 101 may include an automated call
server and/or web host. Further, the server(s) 101 may route an
incoming signal from a nomadic device (ND) 103 to the appropriate
remote vehicle. Data sent in this fashion may be sent using
data-over-voice, a data-plan, or in any other suitable format.
[0034] Data can also be sent to the remote vehicle 121 through the
server(s) 101 using a personal computer 105. In this case, the data
is likely, although not necessarily, sent over the internet
109.
[0035] Once the server(s) 101 receive the incoming data request
from the remote source 103, 105, the message is processed and/or
relayed to a vehicle 121. The vehicle may be identified by a header
associated with one or more incoming data packets, or may be
identifiable based on a database lookup, for example.
[0036] The relay to the vehicle 121 is sent out from the server(s)
101 through a network (e.g., without limitation, a cellular network
113, the internet, etc.) and passed through a cellular network 115
to the vehicle 121. In another embodiment, the relay may be passed
through network 114 (e.g., WiFi or WiMax) and to the vehicle 121. A
remote communication module 200 in the vehicle 121 receives the
signal sent from the server(s) 101 and processes it or relays it to
an appropriate processing system within the vehicle 121.
[0037] In at least one illustrative embodiment, the vehicle 121 is
also outfitted with a communication transceiver, such as, but not
limited to, a BLUETOOTH transceiver. This transceiver may allow
communication with the nomadic device 103 using a direct signal
119.
[0038] It should be understood that the communication between
nomadic device 103, server 101, and vehicle 121 may be performed in
a number of ways and FIG. 1 is presented for illustrative purposes.
FIG. 1 illustrates various alternatives for communicating data. For
example, and without limitation, data communication may be
partially or entirely cellular or WiFi, or a combination of
cellular and WiFi.
[0039] FIGS. 2a-d show illustrative examples of vehicle-based
communication modules that provide communication to a remote
network.
[0040] FIG. 2a shows an illustrative example of a communication
module 200 combined with a GPS module, wherein a cellular module
and GPS are on different boards.
[0041] In this illustrative embodiment, a communications module 200
can include a cellular (e.g., and without limitation, GSM or CDMA)
antenna 201 that communicates with a remote server over a cellular
network. The received cellular signal may be sent from the cellular
antenna 201 to a multi-band cellular (e.g., and without limitation,
GSM or CDMA) decoder 219 that processes the received signal to
produce information usable by the microprocessor 217.
[0042] In this illustrative embodiment, the multi-band cellular
chip 219, including flash memory 207 and RAM 211, is installed in
the module as part of a removable device 223 including a SIM card
221. The SIM card 221 may contain user identifying information that
allows access to the cellular network under a particular user's
plan.
[0043] Additionally, the module includes a GPS chip 203 that can
process and decode a signal from the GPS antenna 205 and send this
information to a microprocessor 217.
[0044] The microprocessor is also in communication with a vehicle
data bus that provides access to various vehicle modules, such as
RF module 215. Other modules not shown include, but are not limited
to, the vehicle cluster, a remote (off-board) GPS system, a radio
module, etc. Non-limiting examples of a vehicle data bus include an
SAE J1850 bus, a CAN bus, a GMLAN bus, and any other vehicle data
buses known in the art. For illustration purposes only, FIGS. 2a-2d
are represented as using a CAN bus.
[0045] FIG. 2b shows a second exemplary embodiment in which a
cellular chip and GPS are on the same board 223. In this
illustrative embodiment, the removable board (this board may also
be permanently attached to the module) 223 may contain the SIM card
221, a GPS module including a GPS chip 203 and a GPS antenna 205a,
and the Multi-band cellular chip 219 including flash memory 207 and
RAM 211.
[0046] In another embodiment, the GPS antenna 205b may be attached
to the module separately from this board 223. When a signal comes
in from the cellular antenna 201 and/or the GPS antenna 205b, the
signal may be sent to the corresponding cellular/GPS chip 203 for
processing, and then passed to the microprocessor 217. The
microprocessor 217 interfaces with the CAN transceiver 213 to
connect to a vehicle network 214 and vehicle modules such as RF
module 215.
[0047] FIG. 2c shows yet another exemplary embodiment in which the
cellular module is standalone. In this illustrative embodiment, the
GPS module containing the GPS antenna 205 and the GPS chip 203 may
connect to the microprocessor 217 through the CAN transceiver 213.
Other vehicle modules, such as an RF module 215 can also connect to
the microprocessor through the CAN transceiver 213.
[0048] In this illustrative embodiment, the removable board 223 may
contain a SIM card 221 and a multi-band cellular chip 219, as well
as a flash memory 207 and RAM 211. Signals from the cellular
antenna 201 may be sent to the board 223 for processing by the
multi-band cellular chip 219 before being sent to the
microprocessor 217.
[0049] FIG. 2d shows still another exemplary embodiment in which a
cellular module is combined with an RF module 215 in the
communications module 200. The RF module 215 may continue to talk
to the microprocessor 217 through the CAN transceiver 213. In this
illustrative embodiment, the GPS module, including the GPS antenna
203a, 203b and GPS chip 205a, 205b can be located within the
communications module 200 or located elsewhere in the vehicle, in
which case it may communicate with the microprocessor 217 through
the CAN transceiver 213.
[0050] Again, in this embodiment, the cellular antenna 201 may send
a signal to the multi-band cellular 219, including flash memory 207
and RAM 211. The signal may be processed and sent to the
microprocessor 217. The multi band cellular chip 219 may be located
on a removable circuit board 223, which may also include a SIM card
221.
[0051] In some embodiments, input(s) may be received in the vehicle
121 through tactile and/or audible inputs. Accordingly, the module
200 may process such inputs received from one or more vehicle
microphones (not shown) and one or more touch-sensitive vehicle
controls (not shown) via vehicle network 214.
[0052] FIG. 3 illustrates a process for registering a user device
for use with the system 100 by a vehicle user (e.g., one or more
drivers and/or one or more passengers). The registration process
may occur any time the system is used or trying to be used
including, but not limited to, before first use and/or with every
use of the system.
[0053] Use of the communications system 100 may be provided once a
vehicle user is a registered user. Accordingly, a vehicle user may
register one or more devices (nomadic device 103 and/or personal
computer 105) to use the communications system 100 (block 300) in
order to gain access to various vehicle-based services from the
nomadic device 103 and/or personal computer 105. Examples of such
vehicle-based services, without limitation, may include remote lock
and unlock, remote start, vehicle tracking, remote control of
vehicle controls (e.g., and without limitation, radio and HVAC),
data download, and others.
[0054] Registration may occur from a nomadic device 103 and/or
personal computer 105 using an Internet connection. In some
embodiments, the vehicle user may download a software application
(e.g., a mobile application) to the personal computer 105 and/or
nomadic device 103. Using this application, the vehicle user may
remotely operate one or more vehicle functions and/or controls via
system 100. In order to download this application, the vehicle user
may additionally or alternatively register for the service.
Registration may occur, for example, through a website.
[0055] In some embodiments, the applications may be located and
executing on a remote computing system, such as server 101 (or a
different server in communication with system 100). In this case,
an application programming interface (API) may be installed on the
nomadic device 103 and/or personal computer 105 and/or a web-based
interface may be used in order to operate the remotely executing
application.
[0056] The registration process may be, but not necessarily, a
single event such that the step may not occur subsequent to a first
use of the system 100. During the registration process, the vehicle
user may establish one or more forms of identification to identify
the vehicle user. Such forms of identification may include a
username and password, one or more security questions, a VIN, a
mobile identification number (MIN), or a combination of such
identification items. Additionally, during the registration process
one or more identifiers, such as a phone number, associated with
the vehicle user may be provided to identify the nomadic device 103
and/or PC 105 which serves as the primary or controlling device.
Also, during the registration process, an identification associated
with the module 200 (e.g., and without limitation, a VIN or
Electronic Serial Number) may be provided to identify the vehicle
having the vehicle controls which may be controlled via the vehicle
communication system 100.
[0057] Once the user is registered, the vehicle user may login from
the nomadic device 103 and/or personal computer 105 (block 302). A
login may include, without limitation, inputting the vehicle user
identification information created by the user during registration.
The input may be one or more touch-sensitive inputs and/or one or
more voice inputs. In some embodiments, the login information may
be saved in memory. In this case, the vehicle user may use the
vehicle-based services without inputting login information.
[0058] One or more commands for a vehicle-based service may be
input and received by the personal computer 105 or nomadic device
103 (block 304). Where the nomadic device 103, personal computer
105, or the remote computing system has software application
installed, this application may receive the command(s). Such
commands may be input using tactile and/or audible inputs. Audible
inputs may include one or more spoken commands.
[0059] Further, vehicle communication module information may be
received identifying the vehicle communication module 200 (block
305). Module information may include, for example, an electronic
serial number associated with the module 200. This information may
be received from the vehicle user via user input. The module
information may be received from the module 200 by the user after a
key-on event in the vehicle. The user may input this information at
the ND 103 and/or PC 105.
[0060] In some embodiments, the module information may be stored in
memory at one or more of the nomadic device 103, personal computer
105, or the remote computing system during, for example,
registration. In this case, the module information may be received
from memory. In some embodiments, the module information may be an
electronic serial number (ESN) associated with the module 200. This
module information may be used to tie the user device (nomadic
device 103 and/or personal computer 105) to the module 200 so that
data and information may be exchanged.
[0061] Since a vehicle user may command one or more vehicle
controls from a nomadic device or a personal computer, either or
both devices may be registered. As represented by block 306, one or
more determinations may be made relating to the type of device used
by the vehicle user.
[0062] If a nomadic device 103 is used, nomadic device information
may be obtained in order for the server 101 to identify the nomadic
device (block 308). The nomadic device information may be input
manually by a vehicle user from the nomadic device 103 or obtained
automatically. Such information may include a mobile identification
number (e.g., a phone number).
[0063] Additionally, one or more registration codes may be input to
and received by the nomadic device 103 (block 310) which may be
used by the system 100 (e.g., at server 101) to confirm (block 312)
that the nomadic device 103 (and, therefore, the vehicle user) is
registered (block 316). The registration code(s) may be received by
a vehicle user from the OEM (via, for example, a vehicle dealer or
a third-party (e.g., a telematics service provider) either through
a physical exchange (e.g., in-person or in a telephone call) or
from an Internet-based exchange (e.g, through an email exchange or
a website). Once received, the code may be input by the vehicle
user. In some embodiments, the registration code (and any
associated authorization codes) may periodically change and, as
such, a new registration code may be received and input by the
vehicle user. The registration code(s) may include numbers,
letters, characters, or a combination of numbers, letters, and
characters. Additionally, the code(s) may comprise graphics and
colors. In some embodiments, the registration code(s) may be input
by the vehicle user and stored in memory (e.g., locally or
remotely) so that, thereafter, the code is automatically
obtained.
[0064] The server 101 may store a registration code which may be
compared to the registration code received by the nomadic device
103 as part of the confirmation process (block 312) to register the
nomadic device 103 (block 316). The confirmation process may occur
at server 101. In some embodiments, the comparison may be made to
confirm that the codes are the same. Alternatively, the comparison
may be made of different, but complementary codes. As one
non-limiting example, the registration code from the vehicle user
may be "ABCD" while the registration code on the server 101 may be
"1234." Accordingly, the server 101 may receive the "ABCD"
registration code and, based on the correspondence between "ABCD"
and "1234," the nomadic device may be recognized (block 316).
[0065] If the registration code is not confirmed (block 312), the
registration code may be requested and, in some embodiments, the
request presented at the nomadic device (block 314). The
registration code may be re-entered (block 310).
[0066] Referring back to block 306, if the vehicle user is using
personal computer 105, information about the personal computer 105
may be obtained in order for the server 101 to identify the
personal computer 105 (block 318). Non-limiting examples of
personal computer information may include an IP address, a MAC
address, or other like identifier. This information may be input by
the vehicle user or obtained automatically.
[0067] As with when a nomadic device 103 is used, a registration
code may be input to and received by the personal computer 105
(block 320) so that the personal computer 105 is registered (block
326). If the registration code(s) is not confirmed, a request for
the registration code may be transmitted to the personal computer
105 and, in some embodiments, presented at the computer 105 (block
324). Details of the confirmation process (block 322) and further
details about the registration code(s) are described above.
Accordingly, for purposes of brevity, these details are not herein
repeated. In some embodiments, the process illustrated in FIG. 3
may be time limited. Accordingly, a timer (e.g., a clock on the
nomadic device 103, the personal computer 105, or the server 101)
may be used to confirm that the registration process is performed
within a predetermined time.
[0068] As represented by circle block A, the authentication process
may further include one or more processes at the vehicle 121. One
non-limiting example of this authentication process is provided in
FIG. 4.
[0069] The authentication request may be received in the vehicle
121 by the module 200 (block 400). In some embodiments, the
authentication request may not be received until the registration
code(s) is confirmed. In other embodiments, the authentication
request may be received at any time. Accordingly, the order of the
processes illustrated in FIGS. 3 and 4 is non-limiting and may be
modified to best fit the particular implementations of the
invention.
[0070] The one or more commands for vehicle-based services from the
vehicle user may be received by the module 200 (block 402). The
command(s) may be transmitted to the vehicle 121 from nomadic
device 103 or personal computer 105 directly or via server 101.
[0071] The authentication sequence may be initiated in the vehicle
(block 404). The module 200 may monitor for the receipt or presence
of one or more authentication items (block 412). The authentication
items may include, but are not limited to, one or more of the
following, individually or in combination: 1 vehicle key, 2 or more
vehicle keys, voice, one or more codes (e.g., numeric, alphabetic,
or alphanumeric), a pattern of maneuvers, or a question and answer
process. In some embodiments, the module may monitor that one or
more of these authentication items are within the vehicle. As one
non-limiting example, the RF module (e.g., a PEPS receiver) may
monitor for the presence of at least two programmed vehicle keys.
If detected, the vehicle user may be confirmed as authenticated
and, further, in the vehicle.
[0072] In other alternative or additional embodiments, the module
may monitor for authentication items that are received from a
remote source (such as nomadic device 103 and/or personal computer
105). As one non-limiting example, the module 200 may monitor for a
code (which may be different than the registration code described
with respect to FIG. 3) or a pattern of maneuvers input at the
nomadic device 103 or personal computer 105. The software
application may receive these authentication items and transmit a
confirmation (e.g., and without limitation, a confirmation flag)
indicating the authentication status of the vehicle user based on
the authentication item (e.g., the code or the maneuvers). The
module, in turn, may monitor for the presence of this confirmation
flag (block 412).
[0073] Of course, the code or maneuvers (in the non-limiting
example above) may be provided in the vehicle. For example, the
vehicle user may input the code using the vehicle's HMI (e.g., and
without limitation, a touchscreen display, a microphone, one or
more controls in the center stack, a vehicle keypad, and others).
Accordingly, the monitoring may be for authentication items at
least some of which may be provided in the vehicle or remote from
the vehicle.
[0074] In some embodiments, the authentication sequence may be time
limited. Accordingly, if the vehicle-based authentication sequence
is not completed within the time period, the command(s) for
vehicle-based services rejected. In this case, a timer may be
initiated as part of the authentication sequence (block 406). The
module 200 may use a vehicle clock, a GPS clock, a crystal
oscillator, or other like timer for measuring the time. The time
period may be measured in seconds, minutes, clock cycles, or
variations thereof.
[0075] In the illustrative embodiment of FIG. 4, monitoring for the
receipt and/or presence of the authentication items may occur if
the monitored period of time has not expired (block 408).
Otherwise, the authorization process may be suspended (block 410).
In some embodiments, when the process is suspended, the
authentication process may be restarted.
[0076] If one or more authentication items have not been received
(block 414), the module 200 may continue to monitor for the
authentication item(s) until the time has expired (block 408).
Additionally, the time may continue to be monitored if one or more
authentication items have been received, but the items are not
valid or recognized (block 416). Non-limiting examples where one or
more authentication items may not be recognized include, but are
not limited to: one key in the vehicle where two are required,
incorrect code(s), incorrect maneuver(s), voice is not recognized,
and the like. Accordingly, if the time has not expired (block 420),
one or more authentication items may continue to be provided (block
412) unless the number of attempts has been exceeded (block 422).
The number of attempts may be predetermined by the OEM (or VCIS
provider). In some embodiments, the vehicle user may get a single
attempt. Once the number of attempts has been exceeded, the
authorization process may be suspended (block 410). In some
embodiments, the authentication process may be restarted.
[0077] It will be appreciated that the time periods 408 and 420 may
comprise a single time period. For example, the receipt (block 412)
and recognition (block 416) of the authentication items may occur
in the same time period in order for the user to be authorized.
Alternatively, the time periods 408,412 may be separate time
periods measured by separate timers or resetting a timer to measure
the time of receipt (block 414) or recognition (block 416) of the
authentication items.
[0078] If the time has expired, the process may be suspended (block
410). In some embodiments, the authentication process may be
restarted.
[0079] If one or more authentication items are recognized (block
416), the vehicle user may be authenticated and authorized to use
the VCIS and the command(s) accepted (block 418). In some
embodiments, recognition of the authentication item(s) may indicate
that an authorized user is in the vehicle.
[0080] In some embodiments, the vehicle user may be provided with
instructions for the authentication process. These instructions may
be presented audibly and/or visually at the nomadic device 103,
personal computer 105, and/or in the vehicle (e.g., and without
limitation, at a vehicle display). These instructions may be
provided as the vehicle user performs each step of the
authorization process. In some embodiments, the instructions may
not be provided until is apparent that the vehicle user requires
assistance. As one non-limiting, non-exhaustive example, the
vehicle user may be provided instructions if the number of times to
input the authentication item(s) has been exceeded.
[0081] FIG. 4B illustrates another embodiment of the authentication
process for authorizing system use. As illustrated in FIG. 4B, a
user requesting authorization may receive module identification
information (such as an ESN) which may be input at the remote
device (e.g., the nomadic device 103 or PC 105) (block 401). As
described above, this information may be, in some embodiments,
received from the module 200 by the user, e.g., after key-on.
[0082] After such information is received by the server 101 (block
403), including user identification information, the server 101 may
determine that a new account is requested based on, for example,
the user information and the module 200 information.
[0083] One or more notifications may be transmitted to the
authorizing user (e.g., the user already having authorization)
indicating that a user has requested authorization (block 405). An
authorizing user may be a vehicle dealer or a private owner of the
vehicle. The user requesting authorization may be an additional
user and/or a substitute user of the system.
[0084] The notification may state, as a non-limiting example, "a
new remote user (name of user) has requested to be account
owner--current owner is (name of current owner)." The notification
may also include instructions for the authorizing user to accept or
reject the request. This notification may be received on the module
200 display (e.g., and without limitation, as a pop-up
notification) and/or in the vehicle as a voice notification. In
additional or alternative embodiments, the notification may be
received on the ND 103 and/or PC 105 as an email, a text message,
instant message, web-based message, and the like (block 407).
[0085] In one embodiment, the authorization may be
accepted/rejected by the requesting user (who then, if accepted,
becomes the additional/substitute user). However, a notification
may be received at the ND 103 and/or PC 105 notifying the current
owner that authorization is being requested and/or authorization
was accepted/rejected.
[0086] If the request is rejected by the authorizing user, the
requesting user(s) may not be authorized to use the system.
However, if accepted by the authorizing user, the requesting
user(s) may be added/substituted (block 411) and the user
authorized (block 413).
[0087] In some embodiments, as illustrated in FIG. 4B, multiple
notifications may be sent to the authorizing user. For example, a
first notification (block 405) may state that authorization is
requested (as described above).
[0088] If authorization is accepted, the additional/substitute
user(s) may only be permitted limited operation of the module 200.
As some non-limiting, non-exhaustive examples, the additional
user(s) may be restricted from GPS tracking, vehicle lock and/or
unlock, and vehicle charging schedule.
[0089] Additional notification(s) may be transmitted after the
first notification for granting authorization to the
additional/substitute user(s). If authorization is accepted, the
additional/substitute user may operate all functions of the module
200 (block 409).
[0090] In some embodiments, there may be a period of time that
elapses before the additional notification(s) are transmitted. The
period of time may be in seconds, minutes, hours, days, or
variations thereof. The time gap may provide additional
confirmation that the additional/substitute user is authorized. For
example, if the period of time that elapses is 24 hours, the time
gap may confirm that an owner has confirmed authorization of the
additional/substitute user (after the second notification) because
a non-owner may not have 24-hour access to the vehicle.
[0091] In some instances, however, a vehicle technician may have
longer than 24 hour access to the vehicle. In this case, if the
unscrupulous technician attempts to self-authorize access to the
system (e.g., via the module 200), the vehicle owner may be
notified at ND 103 and/or PC 105. The vehicle owner may have an
override option which disables authorization to the system 200.
Alternatively, accepting or rejecting authorization after the
second notification may only be permitted from the ND 103 and/or PC
105 so that accepting/rejecting authorization is not permitted from
the vehicle.
[0092] An authorized user may monitor the usage of the VCIS 100.
FIG. 5 illustrates the process for informing an authorized vehicle
user about system usage.
[0093] A request may be received in the vehicle or remotely from
the vehicle (block 500). The request may be received from an
authorized user and/or the module 200. The request may be for
information for select system usage or all system usage.
Accordingly, the usage information may be received according to the
type of information requested (block 502) and presented to an
authorized user.
[0094] Non-limiting and non-exhaustive examples of usage
information that may be obtained and provided to the user are
illustrated in FIG. 5. For example, if there are new nomadic
device(s) 103 that are associated (e.g., paired) with the module
200 (block 504), a notification may be presented with this
information to the user (block 506). The notification may also
include an identification of the nomadic device (e.g., the phone
number). Notifications may be provided in-vehicle (e.g., on a
vehicle display or audibly from one or more speakers), as an
e-mail, text message, a phone call, or other such
notifications.
[0095] In some embodiments, the authorized user may indicate
whether the associated nomadic device 103 is authorized (block 508)
by rejecting the request (block 510) or permitting/accepting the
request (block 512). In some embodiments, granting permission may
not require input or instructions from the authorized user. For
example, the paired nomadic device 103 may be automatically
accepted based on information provided by the authorized user
indicating which nomadic device(s) 103 are authorized, which may be
stored at server 101.
[0096] Additionally or alternatively, the vehicle user may obtain
vehicle tracking information (block 516). In this case, a tracking
event for tracking the vehicle 121 may be received by the module
200 from another person (at another device) and the vehicle's
position transmitted to server 101. As an example, a service
technician, having access to the vehicle, may attempt to track the
vehicle's location. The vehicle user may be notified of the vehicle
tracking (block 506) and may permit (block 512) or deny the
tracking (block 510). The process for denying or granting
permission is described above and, for purposes of brevity, is not
herein repeated.
[0097] Additionally or alternatively, the vehicle user may request
a command history report (block 518). Commands received by the
module 200 may be stored in memory at the vehicle or on the server
101. Accordingly, if a report is not requested, if any command(s)
are received by the module 200, the may be stored (block 514). If
the vehicle user requests a report, the report may be presented in
the vehicle, at the nomadic device 103 or at the personal computer
105 (block 520).
[0098] Other non-limiting examples of notifications (not shown) may
include notification(s) relating to expiration of a subscription to
the service and unavailability of one or more services of the
module 200.
[0099] While exemplary embodiments are illustrated and described
above, it is not intended that these embodiments illustrate and
describe all possibilities. Rather, the words used in the
specification are words of description rather than limitation, and
it is understood that various changes may be made without departing
from the spirit and scope of the invention.
* * * * *